Encrypt / decrypt files or calculate the HASH from the command line. Written in Rust without use of unsafe code.
Uses XChaCha20Poly1305 (https://docs.rs/chacha20poly1305) or AES-256-GCM-SIV (https://docs.rs/aes-gcm-siv) for cryptography, bincode (https://docs.rs/bincode) for encoding and BLAKE3 (https://docs.rs/blake3) or SHA256 / SHA512 (https://docs.rs/sha2) for hashing.
XChaCha20Poly1305 and AES256-GCM-SIV offer higher protection against nonce reuse as compared to ChaCha20Poly1305 oder AES-GCM.
Encrypted files are (and have to be) stored as .crpt.
Both encrypt and decrypt override existing files!
Panics at errors making safe execution impossible but functions mostly return results.
To install: clone the repository and build from source or use cargo install enc_file.
Warning: Don't use for anything important, use VeraCrypt or similar instead.
This crate hasn't been audited or reviewed in any sense. I created it to easily encrypt und decrypt non-important files which won't cause harm if known by third parties.
Please enter the corresponding number to continue:
1 Add new key
2 Remove key
3 Encrypt file using XChaCha20Poly1305
4 Decrypt file using XChaCha20Poly1305
5 Encrypt file using AES-256-GCM-SIV
6 Decrypt file using AES-256-GCM-SIV
7 Calculate Hash
Option to generate a new key.file provided at first run or if no keyfile is detected. Keyfile needs to reside in program directory.
Breaking change in Version 0.3: Changed input of some functions. To encrypt/decrypt and hash use e.g. "encrypt_chacha(readfile(example.file).unwrap(), key).unwrap()". Change to keymap to conveniently work with several keys. You can import your old keys using "Add key" -> "manually".
Breaking change in Version 0.2: Using XChaCha20Poly1305 as default encryption/decryption. AES is still available using encryptaes or decryptaes to maintain backwards compability.
Encrypt/decrypt using XChaCha20Poly1305 and random nonce ```rust use encfile::{encryptchacha, decrypt_chacha};
let text = b"This is a test"; //Plaintext to encrypt
let key: &str = "an example very very secret key."; //Key will normally be chosen from keymap and provided to the encryptchacha() function
let textvec = text.to_vec(); //Convert text to Vec
//Ciphertext stores the len() of encrypted content, the nonce and the actual ciphertext using bincode
let ciphertext = encryptchacha(textvec, key).unwrap(); //encrypt vec
let plaintext = decryptchacha(ciphertext, key).unwrap(); //Decrypt ciphertext to plaintext asserteq!(format!("{:?}", text), format!("{:?}", plaintext)); //Check that text == plaintext ```
Calculate Blake3 Hash ```rust use encfile::{getblake3_hash};
let test = b"Calculating the BLAKE3 Hash of this text";
let testvec = test.tovec(); //Convert text to Vec
Issues and feedback are highly appreciated.